J. Dittmann, B. Karpuschewski, Jana Fruth, M. Petzel, Richard Münder
{"title":"An exemplary attack scenario: threats to production engineering inspired by the Conficker worm","authors":"J. Dittmann, B. Karpuschewski, Jana Fruth, M. Petzel, Richard Münder","doi":"10.1145/1837154.1837158","DOIUrl":null,"url":null,"abstract":"In this article an existing formalisation methodology for malicious code [6] is used to describe characteristics of the worm Conficker variant C to analyse oncoming threats to modern production engineering systems. Based on the Conficker worm formalism and a component model of an exemplary production scenario (the automatic chamfering of great gears with an industrial robot) an exemplary methodology is demonstrated to analyse malware threats to component related security aspects and to compare the criticality of different malware instances for a special system. On the basis of this methodology potential threats to the security of software and hardware components of the exemplary production scenario are simulated and could also be used to illustrate security threats and protection concepts with virtual techniques to help software engineers to program secure software. The threats are illustrated by the means of four exemplary scenarios.","PeriodicalId":131720,"journal":{"name":"International Workshop on Digital Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Workshop on Digital Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1837154.1837158","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
In this article an existing formalisation methodology for malicious code [6] is used to describe characteristics of the worm Conficker variant C to analyse oncoming threats to modern production engineering systems. Based on the Conficker worm formalism and a component model of an exemplary production scenario (the automatic chamfering of great gears with an industrial robot) an exemplary methodology is demonstrated to analyse malware threats to component related security aspects and to compare the criticality of different malware instances for a special system. On the basis of this methodology potential threats to the security of software and hardware components of the exemplary production scenario are simulated and could also be used to illustrate security threats and protection concepts with virtual techniques to help software engineers to program secure software. The threats are illustrated by the means of four exemplary scenarios.